Term
5 Summary of how a business generates revenue, identify product offering, rev, and target customers |
|
Definition
|
|
Term
5 what are the 3 stages of websites |
|
Definition
e-integration e-transcation e-information |
|
|
Term
5 Priceline.coms were customers specify the product and price willing to pay |
|
Definition
|
|
Term
5 trying to out smart a search engine to improve page rankings |
|
Definition
|
|
Term
5 C2C is categorized according to |
|
Definition
number of buyers and sellers |
|
|
Term
|
Definition
all data sent over the internet is routed and treaded the same |
|
|
Term
|
Definition
practice of trying to increase company's visibility |
|
|
Term
|
Definition
anaylzying web surfers behavior |
|
|
Term
|
Definition
paying a fee, for higher visiblitity |
|
|
Term
|
Definition
Methods used to increase a sites ranking |
|
|
Term
|
Definition
stage were web pages are created on the fly to produce tailored info that address partticular shit |
|
|
Term
6 what are the pillars of web 2.0? |
|
Definition
Innovative web tech Leveraging the data of all customers Using the Web as the business platform |
|
|
Term
|
Definition
adding key words to pieces of info |
|
|
Term
|
Definition
data about data. inches, ft |
|
|
Term
6 Netcasts can also be called? |
|
Definition
|
|
Term
|
Definition
comm is when ppl are all meeting at the same time |
|
|
Term
|
Definition
really simple indication- feed used to publish music video, ect |
|
|
Term
|
Definition
tech allowing organ to access data without intimate knowledge of each others systems behind the firewall. |
|
|
Term
6 Content management System? |
|
Definition
software allowing users to publish,edit, track, and retrive digital info |
|
|
Term
7 what is considered a primary threat to an IS? |
|
Definition
accidents, and natural disasters |
|
|
Term
7 what are some technical safegaurds |
|
Definition
firewall and physical access restrictions |
|
|
Term
|
Definition
encoding messages before they enter the network, decoding at the other end |
|
|
Term
|
Definition
|
|
Term
|
Definition
a computer infected by a virus that allows the attacker control without the owners knowledge |
|
|